Reproduction of cw attack on pytorch with corresponding MNIST model
☆22Aug 24, 2020Updated 5 years ago
Alternatives and similar repositories for CW_Attack_on_MNIST
Users that are interested in CW_Attack_on_MNIST are comparing it to the libraries listed below
Sorting:
- Reproduce multiple adversarial attack methods☆21May 5, 2020Updated 5 years ago
- A pytorch implementation of "Towards Evaluating the Robustness of Neural Networks"☆58Sep 4, 2019Updated 6 years ago
- Train several classical classification networks in cifar10 dataset by PyTorch☆24Mar 31, 2021Updated 4 years ago
- 使用pytorch实现FGSM☆33Aug 13, 2021Updated 4 years ago
- Adversarial attack on a CNN trained on MNIST dataset using Targeted I-FGSM and Targeted MI-FGM☆11Feb 17, 2018Updated 8 years ago
- PyTorch implementations of Adversarial defenses and utils.☆34Dec 25, 2023Updated 2 years ago
- Learnable Boundary Guided Adversarial Training (ICCV2021)☆38Dec 9, 2024Updated last year
- Code/Models for Defending Against Universal Attacks Through Selective Feature Regeneration, CVPR 2020☆10Jul 31, 2020Updated 5 years ago
- News in Privacy-Preserving Machine Learning☆12Feb 5, 2020Updated 6 years ago
- Applying backdoor attacks to BadNet on MNIST and ResNet on CIFAR10.☆13Aug 25, 2021Updated 4 years ago
- [NeurIPS 2024 poster] Cross-model Control: Improving Multiple Large Language Models in One-time Training☆14Oct 25, 2024Updated last year
- Simulation of 802.11 DCF MAC protocol and 802.11 with RTS/CTS☆12Nov 21, 2017Updated 8 years ago
- 一个基于io_uring实现的reactor☆10Jun 5, 2022Updated 3 years ago
- ☆12Sep 26, 2024Updated last year
- ☆10Nov 26, 2025Updated 3 months ago
- ☆11Nov 13, 2024Updated last year
- A collection of papers and libraries for performing multi-agent optimization☆17Feb 7, 2026Updated 3 weeks ago
- [JAG 2024] UAD-RS: Universal adversarial defense in remote sensing based on pre-trained denoising diffusion models☆12Nov 8, 2024Updated last year
- ☆11May 2, 2025Updated 10 months ago
- RWKV6 in native pytorch and triton:)☆11Aug 4, 2024Updated last year
- Phase-aware Adversarial Defense for Improving Adversarial Robustness☆11Oct 12, 2023Updated 2 years ago
- Implementation of Self-supervised-Online-Adversarial-Purification☆13Aug 2, 2021Updated 4 years ago
- 编译原理大作业,使用Flex和Bison对Cminus进行词法分析与语法分析☆10Mar 4, 2020Updated 6 years ago
- 吉林大学 基础物理实验 实验报告☆10Sep 24, 2021Updated 4 years ago
- Final Project for AM 207, Fall 2021. Review & experimentation with paper "Adversarial Examples Are Not Bugs, They Are Features"☆10Dec 17, 2021Updated 4 years ago
- Code for "Improving Robustness of Vision Transformers by Reducing Sensitivity to Patch Corruptions"☆14Sep 3, 2023Updated 2 years ago
- Welcome to record interesting (or strange) dreams here! 欢迎在这里记录有趣的(或奇怪的)梦境!☆16Jan 4, 2026Updated 2 months ago
- ☆10May 10, 2019Updated 6 years ago
- ☆11Sep 10, 2024Updated last year
- ☆11Sep 3, 2020Updated 5 years ago
- THU-AIR 联邦学习隐私与安全☆13Jun 26, 2023Updated 2 years ago
- My simple compile program☆12May 23, 2017Updated 8 years ago
- Code for AAAI 2021 Paper "Membership Privacy for Machine Learning Models Through Knowledge Transfer"☆11Apr 5, 2021Updated 4 years ago
- multi-focus image fusion☆12May 7, 2020Updated 5 years ago
- A repo to download and preprocess the Purchase100 dataset extracted from Kaggle: Acquire Valued Shoppers Challenge☆12Jun 21, 2021Updated 4 years ago
- 🌎NUAA 2018 网络安全 - 端口扫描☆11Jul 2, 2018Updated 7 years ago
- Implementation for NIPS2023: A Unified Solution for Privacy and Communication Efficiency in Vertical Federated Learning☆15Apr 25, 2024Updated last year
- List of papers on cryptography assisted deep learning privacy computation☆17Dec 29, 2025Updated 2 months ago
- Pytorch classification with Cifar-10, Cifar-100, and STL-10☆14Jul 24, 2019Updated 6 years ago